Splunk Search

Alert to Report

Susha
Engager

Hi ,

I have some alerts which i want to change as report . the reason is , if there are no events then alert is not sending any data/email where in case of report we can receive atleast one blank csv attacehed report/email  if there is no data .. so as per business requirement we want to change allalert to report .. how can we do that ?

 

Labels (1)
0 Karma

Susha
Engager

thanks @Joannna  for quick revert ..

please consider condition here as a alert which will trigger the events everyday at 9 and it will send that data in CSV .. here problem is i am getting nothing if no data .. if i will convert this in report then it will sent report/email will blank data no matter if data is there or not..

0 Karma

Joannna
Explorer

can you put the search here? the issue should be there

Tags (1)
0 Karma

Joannna
Explorer

Hello ,

 

So basically , an alert is based on a scheduled saved search that whenever certain conditions are overcome, generates one or more actions to be executed.

A report is scheduled by you at an specific time, example everyday at 9 am , or 2 times a day one at 7 other at 4. So this would be your first issue changing to a report.

It should be fairy easy just copy the search and put it on a report , or save as report, if you need futher assistance on that you can add the code here.

0 Karma
Get Updates on the Splunk Community!

Splunk Education - Fast Start Program!

Welcome to Splunk Education! Splunk training programs are designed to enable you to get started quickly and ...

Five Subtly Different Ways of Adding Manual Instrumentation in Java

You can find the code of this example on GitHub here. Please feel free to star the repository to keep in ...

New Splunk APM Enhancements Help Troubleshoot Your MySQL and NoSQL Databases Faster

Splunk Observability has two new enhancements to make it quicker and easier to troubleshoot slow or frequently ...